XenForo 1.5.x Unauthenticated Remote Code Injection

Posted by Vishal Mishra on Dec 15

XenForo 1.5.x Remote Code Execution Vulnerability

1. ADVISORY INFORMATION
=======================
Product: XenForo
Vendor URL: xenforo.com
Type: Code Injection [CWE-94]
Date found: 2016-12-09
Date published: 2016-12-15
CVSSv3 Score: 9.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C)
CVE: –

2. CREDITS
==========

This vulnerability was discovered and researched by indepent security
expert…

Nagios Core < 4.2.2 Curl Command Injection leading to Remote Code Execution [CVE-2016-9565]

Posted by Dawid Golunski on Dec 15

Vulnerability:
Nagios Core < 4.2.2 Curl Command Injection leading to Remote Code Execution

CVE-2016-9565

Discovered by: Dawid Golunski (@dawid_golunski)
https://legalhackers.com

Severity: High

Nagios Core comes with a PHP/CGI front-end which allows to view status
of the monitored hosts.
This front-end contained a Command Injection vulnerability in a RSS feed reader
class that loads (via insecure clear-text HTTP or HTTPS accepting…

Nagios Core < 4.2.4 Root Privilege Escalation [CVE-2016-9566]

Posted by Dawid Golunski on Dec 15

Vulnerability:
Nagios Core < 4.2.4 Root Privilege Escalation
CVE-2016-9566

Discovered by: Dawid Golunski (@dawid_golunski)
https://legalhackers.com

Severity: High

Nagios Core daemon in versions below 4.2.4 was found to perform unsafe
operations when handling the log file. This could be exploited by
malicious local attackers to escalate their privileges from ‘nagios’
system user,
or from a user belonging to ‘nagios’…

CVE-2013-3143: MSIE 9 IEFRAME CMarkup..Remove­Pointer­Pos use-after-free

Posted by Berend-Jan Wever on Dec 15

Since November I have been releasing details on all vulnerabilities I
found that I have not released before. This is the 32nd entry in the
series. This information is available in more detail on my blog at
http://blog.skylined.nl/20161214001.html. There you can find a repro
that triggered this issue in addition to the information below.

If you find these releases useful, and would like to help me make time
to continue releasing this kind of…

After Failed Auction, Shadow Brokers Opens NSA Hacking Tools for Direct Sales

Remember The Shadow Brokers?

The hacker group that’s believed to be behind the high-profile cyber theft of NSA hacking tools and exploits that sparked a larger debate on the Internet concerning abilities of US intelligence agencies and their own security

The group put the stolen cyber weapons on auction but received not much response and gone quiet for some time.
<!– adsense –>
However,

Gstreamer 0.10.x Logic Error

A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. Read the homepage link for full analysis. Proof of concept exploit included in this archive.